Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics. Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics.

Students' Perception of Effectiveness Using Different Methodologies of Teaching Advanced Business Statistics‪.‬

Academy of Information and Management Sciences Journal 1999, Jan, 2, 1

    • 2,99 €
    • 2,99 €

Beschreibung des Verlags

INTRODUCTION Most universities and colleges require students to take one or more statistics courses in many different majors, e.g., education, psychology, business, etc., for the non-specialist. This paper focuses on methods utilized in teaching statistics to those non-specialists who are majoring in a field within business. The traditional method currently used in teaching statistics is widely viewed as being ineffective (Cobb, 1993; Mosteller, 1988). One of the reasons generally given for this lack of success is that current statistical teaching methodology neglects to establish a definitive linkage between statistics in the classroom and its use in "real world" applications (Yilmaz, 1996). The non-specialist does not aspire to be a mathematical theorist, but needs only to use statistics as a tool in analyzing or solving a problem. This paper does not intend to imply that mathematical theory is unimportant, but takes the position that the use of statistics as a tool is equally important to those people involved in the ongoing everyday activities of business and life. The teaching of applied statistics should be approached as a skill. The teaching of any skill involves repetition and the actual performance of an activity, i.e., "hands-on" training. In short, you cannot acquire statistical competencies via the passive role of listening to lectures or observing the professor solve a statistical problem--you can only acquire these skills by being an active participant, i.e. by performing the activities yourself. Smith (1998) states that students should design the study, collect the data, analyze the results, prepare written reports, and give oral presentations.

GENRE
Computer und Internet
ERSCHIENEN
1999
1. Januar
SPRACHE
EN
Englisch
UMFANG
14
Seiten
VERLAG
The DreamCatchers Group, LLC
ANBIETERINFO
The Gale Group, Inc., a Delaware corporation and an affiliate of Cengage Learning, Inc.
GRÖSSE
213
 kB
Impact of Mastery Based Learning Approaches on Student Performance in an Undergraduate Management Science Course. Impact of Mastery Based Learning Approaches on Student Performance in an Undergraduate Management Science Course.
1999
Modern Statistical Methods for HCI Modern Statistical Methods for HCI
2016
Data Mining and Learning Analytics Data Mining and Learning Analytics
2016
Artificial Intelligence in Education Artificial Intelligence in Education
2020
Guide to Advanced Empirical Software Engineering Guide to Advanced Empirical Software Engineering
2007
Teaching Data Analytics Teaching Data Analytics
2019
Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning) Heuristics for Scheduling Operations in MRP: Flowshop Case (Material Requirements Planning)
2006
Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts) Artificial Neural Network Application to Business Performance with Economic Value Added (Manuscripts)
2003
Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report) Predicting Leadership Success in Agile Environments: An Inquiring Systems Approach (Report)
2010
Domain Names and Trademarks--the Unhappy Marriage Continues But the Rules are Clearer. Domain Names and Trademarks--the Unhappy Marriage Continues But the Rules are Clearer.
2001
Sarbanes-Oxley Compliance: New Opportunities for Information Technology Professionals (Public Company Accounting Oversight Board) Sarbanes-Oxley Compliance: New Opportunities for Information Technology Professionals (Public Company Accounting Oversight Board)
2007
Functional Requirements for Secure Code: The Reference Monitor and Use Case. Functional Requirements for Secure Code: The Reference Monitor and Use Case.
2009